IT Management  >   Systems Operations  >   Security  >  

Security Management

RSS Feed   
ALSO CALLED: Management of Security Information, Managing IT Security, Management of Security, IT Security Management, Computer Security Management, Security Administration, Managing Security
DEFINITION: Defense in depth is the coordinated use of multiple security countermeasures to protect the integrity of the information assets in an enterprise. The strategy is based on the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier.Defense in depth minimizes the probability that the efforts of malicious hackers  … 

Security Management definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Security Management Multimedia (View All Report Types)
1 - 25 of 172 Matches Previous Page  |  Next Page
SASE: the next generation of security architecture
sponsored by Vodafone
VIDEO: The Secure Access Service Edge (SASE), coined by Gartner, is a rapidly evolving protection security architecture for businesses today. In the age of a remote and hybrid workforce, security and network complexity has only increased. Take the survey to learn about SASE capabilities and features.
Posted: 05 Oct 2021 | Premiered: 25 Oct 2021

Vodafone

The Future of Successful Cloud Migration is Now
sponsored by WANdisco
VIDEO: PH
Posted: 02 Sep 2021 | Premiered: 02 Sep 2021

WANdisco

Cloud-Native Data Protection in the Era of Ransomware
sponsored by Clumio
VIDEO: Take a quick survey to watch this webcast and learn how Clumio can protect your native cloud workloads in the era of ransomware.
Posted: 24 Aug 2021 | Premiered: 24 Aug 2021

Clumio

The Cloud - Trouble with Snapshots
sponsored by Clumio
VIDEO: When it comes to data protection in the cloud, cloud architects can’t just rely on snapshot management due to exorbitant costs and security vulnerabilities. Take a quick survey to access this video to learn about Clumio’s secure backup as a service for the all-cloud world.
Posted: 24 Aug 2021 | Premiered: 24 Aug 2021

Clumio

Inside the Industry: Tales from the SOC
sponsored by ConnectWise
WEBCAST: How much do you know about what actually goes on behind the scenes when a cybersecurity incident occurs? Access this webinar to hear from cybersecurity and SOC experts as they share the inside scoop on what happens outside of the public eye in the event of an incident.
Posted: 18 Mar 2021 | Premiered: Mar 18, 2021

ConnectWise

SIG - SASE in 15 minutes
sponsored by Cisco Umbrella
WEBCAST: Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
Posted: 26 Feb 2021 | Premiered: Mar 25, 2020

Cisco Umbrella

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

API Security & the OWASP API Top 10
sponsored by Traceable
VIDEO: The OWASP API Top 10 project set out with a clear goal – to identify and provide insight into the most detrimental API vulnerabilities that exist across today’s organizations. Watch this episode of The API Security & the OWASP API Top 10 webinar series for a deep dive into 4 of the 10 critical API threats.
Posted: 17 Feb 2021 | Premiered: 03 Jan 2021

Traceable

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender

Breaking Down Video Conferencing Privacy And Security
sponsored by Pexip
PODCAST: More people are on video than ever before, but this huge increase has also brought increased security concerns. ‘Zoombombing’ and other video conferencing breaches are in the headlines, and enterprises are being called to ensure privacy and security for all users. Jump into this podcast to hear a breakdown of the subject in detail.
Posted: 08 Feb 2021 | Premiered: May 7, 2020

Pexip

Changing the paradigm of security testing
sponsored by Cymulate
VIDEO: According to the SANS institute, half of organizations test their security controls once a year or less. At this cadence, most organizations will be ill-prepared for today’s dynamic cyberthreats. Watch this video to learn about the value of attack and breach simulation, and how to get started at your organization.
Posted: 08 Feb 2021 | Premiered: 08 Feb 2021

Cymulate

The Journey from EDR to MDR
sponsored by Bitdefender
VIDEO: Managed Detection and Response (MDR) represents the fastest growing sector of cybersecurity and it is very clear that security has now become even more important than ever before. This video provides an overview of Endpoint Detection And Response (EDR), MDR and how to know when it’s time to make the switch to MDR.
Posted: 05 Feb 2021 | Premiered: 27 Nov 2020

Bitdefender

Top Security Concerns for New Technology Deployments
sponsored by Thales
VIDEO: Thales releases an annual Data Threat Report, which compiles their research into the evolving landscape of cyberthreats, data security, and more. Watch this video for a 45-minute walkthrough of this year’s results, which include everything from zero trust, to mutlicloud environments, to quantum computing and everything in between.
Posted: 29 Jan 2021 | Premiered: 29 Jan 2021

Thales

Axis Security Video
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

Axis Security Video 1
sponsored by Axis Security
VIDEO: Your private business apps are the beating heart of your organization, but there’s a huge disconnect between these private apps and the people who need to use them. As a result, third-party contractors, employees and others experience delays or are shut out altogether. View this short video to learn about a new approach to private app access.
Posted: 07 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

Ransomware Threat Spotlight
sponsored by Barracuda
VIDEO: Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
Posted: 23 Dec 2020 | Premiered: 23 Dec 2020

Barracuda

Bridge your Executive Team
sponsored by WhiteHat Security
WEBCAST: Application security is becoming increasingly important as applications play a more prominent role in driving today’s economy. Watch this webinar to learn more about the current state of AppSec, the challenges security teams are facing and how to get executive buy-in for AppSec initiatives.
Posted: 16 Dec 2020 | Premiered: Dec 16, 2020

WhiteHat Security

Women Building Careers in Cybersecurity
sponsored by WhiteHat Security
WEBCAST: According to a recent study, women make up nearly half of the adult workforce in the US yet hold only a quarter of technology positions – a number that dwindles as you move up the leadership ladder. Watch this webinar and join a panel of women leaders in the tech industry as they discuss their experiences, challenges and accomplishments.
Posted: 15 Dec 2020 | Premiered: Oct 15, 2020

WhiteHat Security

Are Your Apps in the Race to Win?
sponsored by WhiteHat Security
WEBCAST: For modern organizations, applications play a prominent role in both internal operations and interacting with end-users. As a result, application security has become critical. Watch this webinar to learn more about AppSec and why it’s critical for digital transformation initiatives.
Posted: 11 Dec 2020 | Premiered: Dec 11, 2020

WhiteHat Security

Whitehat Security Webinar
sponsored by WhiteHat Security
WEBCAST: Dynamic Application Security Testing (DAST) enables AppSec teams with the ability to assess and address the actual risk of their applications – providing critical security capabilities to support DevSecOps initiatives. Watch this webinar to learn more about DAST and how it can support your AppSec goals.
Posted: 10 Dec 2020 | Premiered: Dec 10, 2020

WhiteHat Security

The State of Application Security
sponsored by WhiteHat Security
WEBCAST: Attackers continue to take advantage of application flaws to compromise organizations and put their customers at risk. This means that as much as Dev teams prioritize faster release cycles, it’s important that they don’t overlook security. In this WhiteHat webinar, examine the state of application security and what you can do to stay protected.
Posted: 09 Dec 2020 | Premiered: Dec 9, 2020

WhiteHat Security

Security in the Fast Lane
sponsored by WhiteHat Security
WEBCAST: Today’s organizations rely on a collection of applications in order to maintain internal operations and interact with end-users. However, dangerous threats targeting data in these critical apps have emerged. Watch this webinar to learn more about the application security threat landscape, notable breaches and how to protect your apps.
Posted: 04 Dec 2020 | Premiered: Dec 4, 2020

WhiteHat Security

Cybersecurity: It's a Team Sport
sponsored by WhiteHat Security
WEBCAST: During the pandemic, cybercrime has quadrupled, leaving many organizations scrambling to strengthen their security posture. In this webinar, learn why it’s more important than ever for vendors, partners and customers to work together and build a true cybersecurity team to combat the evolving threat landscape.
Posted: 03 Dec 2020 | Premiered: Dec 3, 2020

WhiteHat Security
1 - 25 of 172 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences